Vous êtes sur la page 1sur 13

Presentation

on
CRYPTOGRAPH
Y

               Submitted By:


                                                                      
  Amartya Bhushan Pandey
              
Index
Introduction 
What is Cryptography?
Purpose Of cryptography
Architecture of cryptography 
 Types of Cryptography
Types Of cryptography Algorithms
Conclusion
INTRODUCTION

The Internet or the global Internet is the internationally


connected network of computer networks with addresses that are
administrated by IANA (Internet address and Naming Authority).

There are many aspects to security and many applications,


ranging from secure commerce and payments to private
communications and protecting passwords. One essential aspect
for secure communications is that of cryptography.
Cryptography
 
derived its name from a Greek word called
What is Cryptography?
“krypto’s” which means “Hidden Secrets”.

Cryptography is the practice and study of hiding information. It


convert a plain intelligible data into an unintelligible data and
again retransforming that message into its original form.

  Authentication: The process of proving one's identity. (The
PURPOSE OF CRYPTOGRAPHY
primary forms of host-to-host authentication on the Internet.)

 Privacy : Ensuring that no one can read the message except


the intended receiver.

 Integrity: Assuring the receiver that the received message has


not been altered in any way from the original.
Architecture of cryptography
 
Types of Cryptography

Secret Key Cryptography


• Single key used to encrypt and decrypt.

• Key must be known by both parties.

• Assuming we live in a hostile environment it may be hard to


share a secret key.
 
 One
Public Keyof the keys
allocated to each person is called the "public
Cryptography

key", and is published in an open directory somewhere where


anyone can easily look it up, for example by email address.

Each entity has 2 keys:


 Private Key (a secret)
 Public key (well known).
Using Keys
 Private keys are used for decrypting.
 Public keys are used for encrypting.
 
TYPES OF CRYPTOGRAPHIC ALGORITHMS
Hash functions
Is a type of one-way function this are fundamental for much of
cryptography.

A one way function - is a function that is easy to calculate but


hard to invert.

It is difficult to calculate the input to the function given its


output.
CONCLUSION
We use either private key cryptography or public key
cryptography according to requirement.

 If we want to send message quickly we use private key


algorithm and if we want to send messages secretly we use
public key algorithm.
Thanks…!!!
Any Query

Vous aimerez peut-être aussi